Category: Press releases
Here’s What ThreatQuotient’s Crystal Ball Says for 2023
Here’s What ThreatQuotient’s Crystal Ball Says for 2023 Dave Krasik From the team at ThreatQuotient, we hope you had a wonderful 2022 and are looking forward to an even better […]2022, Naughty or Nice?
2022, Naughty or Nice? Noor Boulos There were so many notable things that have happened in 2022, here’s some to name a few. We have gotten back to a “normal” […]Tis’ the Season to Read the Hottest Topics
Tis’ the Season to Read the Hottest Topics Julia Weifenbach If you find yourself searching for something to summarize the year, you’ve come to the right place. We’ve got you […]Thinking of a SecOps Platform? Showing ROI Just Got Easier
Thinking of a SecOps Platform? Showing ROI Just Got Easier Noor Boulos As threats have continued to evolve, enterprises have made significant investments in security infrastructure and security operations is […]How Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and Response
How Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and Response Michael Clark, Director of Threat Research at Sysdig It is always interesting to learn about real-world […]Wrapping up CSAM 2022 with Vulnerability Management Advice for Everyone
Wrapping up CSAM 2022 with Vulnerability Management Advice for Everyone Chris Jacob As we wrap up Cybersecurity Awareness Month (CSAM) 2022, the final topic we’ll cover is updating software and […]Phishing Scams Have Reached New Heights: How to Improve Detection and Response
Phishing Scams Have Reached New Heights: How to Improve Detection and Response Leon Ward The Anti-Phishing Working Group (APWG) Phishing Activity Trends Report reveals that in Q2 of 2022 there […]Help Enable Smarter Decisions During Cybersecurity Awareness Month
Help Enable Smarter Decisions During Cybersecurity Awareness Month Noor Boulos Do a quick search for the top cybersecurity breaches thus far in 2022 and you’ll quickly be overwhelmed with reports […]Unlock the Power of Automation: Vulnerability Management
Unlock the Power of Automation: Vulnerability Management Dave Krasik We’ve spoken extensively about the importance of taking a data-driven approach to Vulnerability Management. In short the efficiency and effectiveness of […]Unlock the Power of Security Automation: Threat Intelligence Management
Unlock the Power of Security Automation: Threat Intelligence Management Chris Jacob Threat intelligence has become a significant input to the overall ecosystem that organizations leverage in their security footprint. Managing […]Load More